We present attacks on the anonymity and pseudonymity provided by a "lonely hearts" dating service and by the HushMail encrypted email system. We move on to discuss some generic attacks upon anonymous systems based on the engineering reality of these systems rather than the theoretical foundations on which they are based. However, for less sophisticated users it is social engineering attacks, owing nothing to computer science, that pose the biggest day-to-day danger. This practical experience then permits a start to be made on developing a security policy model for pseudonymous communications.
CITATION STYLE
Clayton, R., Danezis, G., & Kuhn, M. G. (2001). Real world patterns of failure in anonymity systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2137, pp. 230–245). Springer Verlag. https://doi.org/10.1007/3-540-45496-9_17
Mendeley helps you to discover research relevant for your work.